Sciweavers

136 search results - page 4 / 28
» Securing interdependent assets
Sort
View
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
14 years 4 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
SAC
2010
ACM
14 years 4 months ago
Nudge: intermediaries' role in interdependent network security
ombiners for Software Hardening - Extended Abstract (Short Paper) Amir Herzberg and Haya Shulman (Bar Ilan University) The PUF Promise (Short Paper) Heike Busch and Miroslava Sotak...
Jens Grossklags, Svetlana Radosavac, Alvaro A. C&a...
NIPS
2003
13 years 11 months ago
Algorithms for Interdependent Security Games
Michael J. Kearns, Luis E. Ortiz
JIFS
2010
65views more  JIFS 2010»
13 years 8 months ago
Secure and efficient protocols for multiple interdependent issues negotiation
Katsuhide Fujita, Takayuki Ito, Mark Klein